Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (449)
  • Open Access

    ARTICLE

    IoT and Machine Learning Based Stem Borer Pest Prediction

    Rana Muhammad Nadeem1, Arfan Jaffar2, Rana Muhammad Saleem3,*

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1377-1392, 2022, DOI:10.32604/iasc.2022.020680 - 09 October 2021

    Abstract Global climatic changes have severe impacts on agricultural productivity. Enhanced pest attacks on crops are one of the major impacts on sustainable developments in agriculture to come up with the needs of the ever-increasing human population. Early warning of a pest attack is important for Integrated Pest Management (IPM) activities to be effective. Early warning of pest attacks is also important for judicious use of pesticides for efficient use of resources for minimal impacts on the environment. Sugarcane is the major cash crop and is also severely affected by different types of pests. This study… More >

  • Open Access

    ARTICLE

    Quantum Firefly Secure Routing for Fog Based Wireless Sensor Networks

    R. Dayana1,*, G. Maria Kalavathy2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1511-1528, 2022, DOI:10.32604/iasc.2022.020551 - 09 October 2021

    Abstract Wireless Sensor Networks (WSNs) become an integral part of Internet of Things (IoT) and finds their applicability in several domains. As classical WSN faces several issues in service-based IoT applications, fog computing has been introduced in real-time, enabling local data processing and avoid raw data transmission to cloud servers. The Fog-based WSN generally involves advanced nodes, normal nodes, and some Fog Nodes (FN). Though the Fog-based WSN offers several benefits, there is a need to develop an effective trust-based secure routing protocol for data transmission among Cluster Heads (CHs) and FNs. In this view, this… More >

  • Open Access

    ARTICLE

    Cost Optimized Switching of Routing Protocol Scheme for IoT Applications

    Karunanithi Praveen kumar, Perumal Sivanesan*

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 67-82, 2022, DOI:10.32604/csse.2022.018867 - 08 October 2021

    Abstract In this work, we propose a context-aware switching of routing protocol scheme for specific application requirements of IoT in real-time using a software-defined networking controller in wireless sensor networks. The work planned has two stages i) Selection of suitable routing protocol (RP) for given IoT applications using higher cognitive process and ii) Deployment of the corresponding routing protocol. We use the supervised learning-regression method for classification of the routing protocol while considering the network parameters like stability, path delay, energy utilization, and throughput. The chosen routing protocol will be set in the sensor network using… More >

  • Open Access

    ARTICLE

    Energy and Bandwidth Based Link Stability Routing Algorithm for IoT

    D. Kothandaraman1, A. Balasundaram2,*, R. Dhanalakshmi3, Arun Kumar Sivaraman4, S. Ashokkumar5, Rajiv Vincent4, M. Rajesh4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3875-3890, 2022, DOI:10.32604/cmc.2022.020744 - 27 September 2021

    Abstract Internet of Things (IoT) is becoming popular nowadays for collecting and sharing the data from the nodes and among the nodes using internet links. Particularly, some of the nodes in IoT are mobile and dynamic in nature. Hence maintaining the link among the nodes, efficient bandwidth of the links among the mobile nodes with increased life time is a big challenge in IoT as it integrates mobile nodes with static nodes for data processing. In such networks, many routing-problems arise due to difficulties in energy and bandwidth based quality of service. Due to the mobility… More >

  • Open Access

    ARTICLE

    An IoT Based Secure Patient Health Monitoring System

    Kusum Yadav1, Ali Alharbi1, Anurag Jain2,*, Rabie A. Ramadan1

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3637-3652, 2022, DOI:10.32604/cmc.2022.020614 - 27 September 2021

    Abstract Internet of things (IoT) field has emerged due to the rapid growth of artificial intelligence and communication technologies. The use of IoT technology in modern healthcare environments is convenient for doctors and patients as it can be used in real-time monitoring of patients, proper administration of patient information, and healthcare management. However, the usage of IoT in the healthcare domain will become a nightmare if patient information is not securely maintained while transferring over an insecure network or storing at the administrator end. In this manuscript, the authors have developed a secure IoT healthcare monitoring system… More >

  • Open Access

    ARTICLE

    Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks

    Vasaki Ponnusamy1,*, Mamoona Humayun2, N. Z. Jhanjhi3, Aun Yichiet1, Maram Fahhad Almufareh2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1199-1215, 2022, DOI:10.32604/csse.2022.018518 - 24 September 2021

    Abstract Internet of Things (IoT) devices work mainly in wireless mediums; requiring different Intrusion Detection System (IDS) kind of solutions to leverage 802.11 header information for intrusion detection. Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks. This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods, IDS techniques, IDS placement strategies, and traffic data analysis techniques. This paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT… More >

  • Open Access

    ARTICLE

    A CPK-Based Identity Authentication Scheme for IoT

    Mingming Zhang1, Jiaming Mao1,*, Yuanyuan Ma2, Liangjie Xu3, Chuanjun Wang1, Ran Zhao1, Zhihao Li3, Lu Chen4, Wenbing Zhao5

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1217-1231, 2022, DOI:10.32604/csse.2022.017657 - 24 September 2021

    Abstract As the power Internet of Things (IoT) enters the security construction stage, the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality. The existing public key infrastructure (PKI)-based security authentication scheme is currently difficult to apply in many terminals in IoT. Its key distribution and management costs are high, which hinders the development of power IoT security construction. Combined Public Key (CPK) technology uses a small number of seeds to generate unlimited public keys. It is very suitable for identity authentication in the power Internet of… More >

  • Open Access

    ARTICLE

    Using Mobile Technology to Construct a Network Medical Health Care System

    Sung-Jung Hsiao1, Wen-Tsai Sung2,*

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 729-748, 2022, DOI:10.32604/iasc.2022.020332 - 22 September 2021

    Abstract In this study, a multisensory physiological measurement system was built with wireless transmission technology, using a DSPIC30F4011 as the master control center and equipped with physiological signal acquisition modules such as an electrocardiogram module, blood pressure module, blood oxygen concentration module, and respiratory rate module. The physiological data were transmitted wirelessly to Android-based mobile applications via the TCP/IP or Bluetooth serial ports of Wi-Fi. The Android applications displayed the acquired physiological signals in real time and performed a preliminary abnormity diagnosis based on the measured physiological data and built-in index diagnostic data provided by doctors,… More >

  • Open Access

    REVIEW

    A Review on Privacy Preservation of Location-Based Services in Internet of Things

    Raniyah Wazirali*

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 767-779, 2022, DOI:10.32604/iasc.2022.019243 - 22 September 2021

    Abstract Internet of Things (IoT) has become popular with the rapid development of sensing devices, and it offers a large number of services. Location data is one of the most important information required for IoT systems. With the widespread of Location Based Services (LBS) applications, the privacy and security threats are also emerging. Recently, a large number of studies focused on localization and positioning functionalities, however, the risk associated with user privacy has not been sufficiently addressed so far. Therefore, privacy and security of device location in IoT systems is an active area of research. Since… More >

  • Open Access

    ARTICLE

    Data Traffic Reduction with Compressed Sensing in an AIoT System

    Hye-Min Kwon1, Seng-Phil Hong2, Mingoo Kang1, Jeongwook Seo1,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1769-1780, 2022, DOI:10.32604/cmc.2022.020027 - 07 September 2021

    Abstract To provide Artificial Intelligence (AI) services such as object detection, Internet of Things (IoT) sensor devices should be able to send a large amount of data such as images and videos. However, this inevitably causes IoT networks to be severely overloaded. In this paper, therefore, we propose a novel oneM2M-compliant Artificial Intelligence of Things (AIoT) system for reducing overall data traffic and offering object detection. It consists of some IoT sensor devices with random sampling functions controlled by a compressed sensing (CS) rate, an IoT edge gateway with CS recovery and domain transform functions related… More >

Displaying 331-340 on page 34 of 449. Per Page